Sophisticated Online Attacks: An In-Depth Analysis

Hear from the FBI on the tenets of cyber defense and current trends in cybercrime.

Then, learn from Shape Security about a specific type of cybercrime: imitation attacks. VP of Shape Intelligence, Dan Woods, will explain all of the ways in which bad actors manipulate their attack infrastructure to appear like genuine users and then share dozens of techniques to more effectively mitigate attacks on your web and mobile applications.

About the Author

Palmore is the leader of the San Francisco FBI - Cyber Security Branch. His responsibilities include strategic and tactical operational management of cyber intrusion investigators, computer scientists, analysts and digital forensics personnel charged with conducting and supporting investigations of cyber threat actors in criminal and national security intrusion matters. His leadership and investigative experiences include: Cyber Security, Crisis Management, Risk-Management Advisory and Counter-Terrorism. He has a B.S. from the United States Naval Academy and a MBA from Pepperdine University.

Before joining Shape Security, Woods served as assistant chief agent of special investigations at the Arizona Attorney General's Office, where he investigated complex fraud. Prior to that, he spent 20 years with local, state and federal law enforcement agencies and intelligence organizations, including the FBI, where he specialized in information operations and cybercrime.

Operation Success!

Risk Management Framework: Learn from NIST

From heightened risks to increased regulations, senior leaders at all levels are pressured to
improve their organizations' risk management capabilities. But no one is showing them how -
until now.

Learn the fundamentals of developing a risk management program from the man who wrote the book
on the topic: Ron Ross, computer scientist for the National Institute of Standards and
Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37
- the bible of risk assessment and management - will share his unique insights on how to:

Understand the current cyber threats to all public and private sector organizations;

Develop a multi-tiered risk management approach built upon governance, processes and
information systems;

Enter your email address to reset your password

Already have anISMG account?

Forgot Your Password Message:

Contact Us

Already have anISMG account?

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.